Index: chrome_elf/blacklist/test/blacklist_test.cc |
diff --git a/chrome_elf/blacklist/test/blacklist_test.cc b/chrome_elf/blacklist/test/blacklist_test.cc |
deleted file mode 100644 |
index cdf7b290442442f607047d72072527a9e5bb4da3..0000000000000000000000000000000000000000 |
--- a/chrome_elf/blacklist/test/blacklist_test.cc |
+++ /dev/null |
@@ -1,348 +0,0 @@ |
-// Copyright 2013 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include <stddef.h> |
- |
-#include "base/environment.h" |
-#include "base/files/file_path.h" |
-#include "base/files/scoped_temp_dir.h" |
-#include "base/i18n/case_conversion.h" |
-#include "base/macros.h" |
-#include "base/path_service.h" |
-#include "base/scoped_native_library.h" |
-#include "base/strings/string16.h" |
-#include "base/strings/string_number_conversions.h" |
-#include "base/strings/utf_string_conversions.h" |
-#include "base/test/test_reg_util_win.h" |
-#include "base/win/registry.h" |
-#include "chrome/common/chrome_version.h" |
-#include "chrome_elf/blacklist/blacklist.h" |
-#include "chrome_elf/blacklist/test/blacklist_test_main_dll.h" |
-#include "chrome_elf/chrome_elf_constants.h" |
-#include "testing/gtest/include/gtest/gtest.h" |
- |
-const wchar_t kTestDllName1[] = L"blacklist_test_dll_1.dll"; |
-const wchar_t kTestDllName2[] = L"blacklist_test_dll_2.dll"; |
-const wchar_t kTestDllName3[] = L"blacklist_test_dll_3.dll"; |
- |
-const wchar_t kDll2Beacon[] = L"{F70A0100-2889-4629-9B44-610FE5C73231}"; |
-const wchar_t kDll3Beacon[] = L"{9E056AEC-169E-400c-B2D0-5A07E3ACE2EB}"; |
- |
-extern const wchar_t* kEnvVars[]; |
- |
-extern "C" { |
-// When modifying the blacklist in the test process, use the exported test dll |
-// functions on the test blacklist dll, not the ones linked into the test |
-// executable itself. |
-__declspec(dllimport) void TestDll_AddDllsFromRegistryToBlacklist(); |
-__declspec(dllimport) bool TestDll_AddDllToBlacklist(const wchar_t* dll_name); |
-__declspec(dllimport) int TestDll_BlacklistSize(); |
-__declspec(dllimport) void TestDll_BlockedDll(size_t blocked_index); |
-__declspec(dllimport) int TestDll_GetBlacklistIndex(const wchar_t* dll_name); |
-__declspec(dllimport) bool TestDll_IsBlacklistInitialized(); |
-__declspec(dllimport) bool TestDll_RemoveDllFromBlacklist( |
- const wchar_t* dll_name); |
-__declspec(dllimport) bool TestDll_SuccessfullyBlocked( |
- const wchar_t** blocked_dlls, |
- int* size); |
-} |
- |
-namespace { |
- |
-struct TestData { |
- const wchar_t* dll_name; |
- const wchar_t* dll_beacon; |
-} test_data[] = { |
- {kTestDllName2, kDll2Beacon}, |
- {kTestDllName3, kDll3Beacon} |
-}; |
- |
-class BlacklistTest : public testing::Test { |
- protected: |
- BlacklistTest() : override_manager_(), num_initially_blocked_(0) { |
- override_manager_.OverrideRegistry(HKEY_CURRENT_USER); |
- } |
- |
- void CheckBlacklistedDllsNotLoaded() { |
- base::FilePath current_dir; |
- ASSERT_TRUE(PathService::Get(base::DIR_EXE, ¤t_dir)); |
- |
- for (size_t i = 0; i < arraysize(test_data); ++i) { |
- // Ensure that the dll has not been loaded both by inspecting the handle |
- // returned by LoadLibrary and by looking for an environment variable that |
- // is set when the DLL's entry point is called. |
- base::ScopedNativeLibrary dll_blacklisted( |
- current_dir.Append(test_data[i].dll_name)); |
- EXPECT_FALSE(dll_blacklisted.is_valid()); |
- EXPECT_EQ(0u, ::GetEnvironmentVariable(test_data[i].dll_beacon, NULL, 0)); |
- dll_blacklisted.Reset(NULL); |
- |
- // Ensure that the dll is recorded as blocked. |
- int array_size = 1 + num_initially_blocked_; |
- std::vector<const wchar_t*> blocked_dlls(array_size); |
- TestDll_SuccessfullyBlocked(&blocked_dlls[0], &array_size); |
- EXPECT_EQ(1 + num_initially_blocked_, array_size); |
- EXPECT_STREQ(test_data[i].dll_name, blocked_dlls[num_initially_blocked_]); |
- |
- // Remove the DLL from the blacklist. Ensure that it loads and that its |
- // entry point was called. |
- EXPECT_TRUE(TestDll_RemoveDllFromBlacklist(test_data[i].dll_name)); |
- base::ScopedNativeLibrary dll(current_dir.Append(test_data[i].dll_name)); |
- EXPECT_TRUE(dll.is_valid()); |
- EXPECT_NE(0u, ::GetEnvironmentVariable(test_data[i].dll_beacon, NULL, 0)); |
- dll.Reset(NULL); |
- |
- ::SetEnvironmentVariable(test_data[i].dll_beacon, NULL); |
- |
- // Ensure that the dll won't load even if the name has different |
- // capitalization. |
- base::string16 uppercase_name = |
- base::i18n::ToUpper(test_data[i].dll_name); |
- EXPECT_TRUE(TestDll_AddDllToBlacklist(uppercase_name.c_str())); |
- base::ScopedNativeLibrary dll_blacklisted_different_case( |
- current_dir.Append(test_data[i].dll_name)); |
- EXPECT_FALSE(dll_blacklisted_different_case.is_valid()); |
- EXPECT_EQ(0u, ::GetEnvironmentVariable(test_data[i].dll_beacon, NULL, 0)); |
- dll_blacklisted_different_case.Reset(NULL); |
- |
- EXPECT_TRUE(TestDll_RemoveDllFromBlacklist(uppercase_name.c_str())); |
- |
- // The blocked dll was removed, so the number of blocked dlls should |
- // return to what it originally was. |
- int num_blocked_dlls = 0; |
- TestDll_SuccessfullyBlocked(NULL, &num_blocked_dlls); |
- EXPECT_EQ(num_initially_blocked_, num_blocked_dlls); |
- } |
- } |
- |
- scoped_ptr<base::win::RegKey> blacklist_registry_key_; |
- registry_util::RegistryOverrideManager override_manager_; |
- |
- // The number of dlls initially blocked by the blacklist. |
- int num_initially_blocked_; |
- |
- private: |
- void SetUp() override { |
- // Force an import from blacklist_test_main_dll. |
- InitBlacklistTestDll(); |
- blacklist_registry_key_.reset( |
- new base::win::RegKey(HKEY_CURRENT_USER, |
- blacklist::kRegistryBeaconPath, |
- KEY_QUERY_VALUE | KEY_SET_VALUE)); |
- |
- // Find out how many dlls were blocked before the test starts. |
- TestDll_SuccessfullyBlocked(NULL, &num_initially_blocked_); |
- } |
- |
- void TearDown() override { |
- TestDll_RemoveDllFromBlacklist(kTestDllName1); |
- TestDll_RemoveDllFromBlacklist(kTestDllName2); |
- TestDll_RemoveDllFromBlacklist(kTestDllName3); |
- } |
-}; |
- |
-TEST_F(BlacklistTest, Beacon) { |
- // Ensure that the beacon state starts off 'running' for this version. |
- LONG result = blacklist_registry_key_->WriteValue( |
- blacklist::kBeaconState, blacklist::BLACKLIST_SETUP_RUNNING); |
- EXPECT_EQ(ERROR_SUCCESS, result); |
- |
- result = blacklist_registry_key_->WriteValue(blacklist::kBeaconVersion, |
- TEXT(CHROME_VERSION_STRING)); |
- EXPECT_EQ(ERROR_SUCCESS, result); |
- |
- // First call should find the beacon and reset it. |
- EXPECT_TRUE(blacklist::ResetBeacon()); |
- |
- // First call should succeed as the beacon is enabled. |
- EXPECT_TRUE(blacklist::LeaveSetupBeacon()); |
-} |
- |
-TEST_F(BlacklistTest, AddAndRemoveModules) { |
- EXPECT_TRUE(TestDll_AddDllToBlacklist(L"foo.dll")); |
- // Adding the same item twice should be idempotent. |
- EXPECT_TRUE(TestDll_AddDllToBlacklist(L"foo.dll")); |
- EXPECT_TRUE(TestDll_RemoveDllFromBlacklist(L"foo.dll")); |
- EXPECT_FALSE(TestDll_RemoveDllFromBlacklist(L"foo.dll")); |
- |
- // Increase the blacklist size by 1 to include the NULL pointer |
- // that marks the end. |
- int empty_spaces = |
- blacklist::kTroublesomeDllsMaxCount - (TestDll_BlacklistSize() + 1); |
- std::vector<base::string16> added_dlls; |
- added_dlls.reserve(empty_spaces); |
- for (int i = 0; i < empty_spaces; ++i) { |
- added_dlls.push_back(base::IntToString16(i) + L".dll"); |
- EXPECT_TRUE(TestDll_AddDllToBlacklist(added_dlls[i].c_str())) << i; |
- } |
- EXPECT_FALSE(TestDll_AddDllToBlacklist(L"overflow.dll")); |
- for (int i = 0; i < empty_spaces; ++i) { |
- EXPECT_TRUE(TestDll_RemoveDllFromBlacklist(added_dlls[i].c_str())) << i; |
- } |
- EXPECT_FALSE(TestDll_RemoveDllFromBlacklist(added_dlls[0].c_str())); |
- EXPECT_FALSE( |
- TestDll_RemoveDllFromBlacklist(added_dlls[empty_spaces - 1].c_str())); |
-} |
- |
-TEST_F(BlacklistTest, SuccessfullyBlocked) { |
- // Add 5 news dlls to blacklist. |
- const int kDesiredBlacklistSize = 1; |
- std::vector<base::string16> dlls_to_block; |
- for (int i = 0; i < kDesiredBlacklistSize; ++i) { |
- dlls_to_block.push_back(base::IntToString16(i) + L".dll"); |
- ASSERT_TRUE(TestDll_AddDllToBlacklist(dlls_to_block[i].c_str())); |
- } |
- |
- // Block the dlls, one at a time, and ensure SuccesfullyBlocked correctly |
- // passes the list of blocked dlls. |
- for (int i = 0; i < kDesiredBlacklistSize; ++i) { |
- TestDll_BlockedDll(TestDll_GetBlacklistIndex(dlls_to_block[i].c_str())); |
- |
- int size = 0; |
- TestDll_SuccessfullyBlocked(NULL, &size); |
- ASSERT_EQ(num_initially_blocked_ + i + 1, size); |
- |
- std::vector<const wchar_t*> blocked_dlls(size); |
- TestDll_SuccessfullyBlocked(&(blocked_dlls[0]), &size); |
- ASSERT_EQ(num_initially_blocked_ + i + 1, size); |
- |
- for (int j = 0; j <= i; ++j) { |
- EXPECT_STREQ(blocked_dlls[num_initially_blocked_ + j], |
- dlls_to_block[j].c_str()); |
- } |
- } |
- |
- // Remove the dlls from the blacklist now that we are done. |
- for (const auto& dll : dlls_to_block) { |
- EXPECT_TRUE(TestDll_RemoveDllFromBlacklist(dll.c_str())); |
- } |
-} |
- |
-TEST_F(BlacklistTest, LoadBlacklistedLibrary) { |
- base::FilePath current_dir; |
- ASSERT_TRUE(PathService::Get(base::DIR_EXE, ¤t_dir)); |
- |
- // Ensure that the blacklist is loaded. |
- ASSERT_TRUE(TestDll_IsBlacklistInitialized()); |
- |
- // Test that an un-blacklisted DLL can load correctly. |
- base::ScopedNativeLibrary dll1(current_dir.Append(kTestDllName1)); |
- EXPECT_TRUE(dll1.is_valid()); |
- dll1.Reset(NULL); |
- |
- int num_blocked_dlls = 0; |
- TestDll_SuccessfullyBlocked(NULL, &num_blocked_dlls); |
- EXPECT_EQ(num_initially_blocked_, num_blocked_dlls); |
- |
- // Add all DLLs to the blacklist then check they are blocked. |
- for (size_t i = 0; i < arraysize(test_data); ++i) { |
- EXPECT_TRUE(TestDll_AddDllToBlacklist(test_data[i].dll_name)); |
- } |
- CheckBlacklistedDllsNotLoaded(); |
-} |
- |
-TEST_F(BlacklistTest, AddDllsFromRegistryToBlacklist) { |
- // Ensure that the blacklist is loaded. |
- ASSERT_TRUE(TestDll_IsBlacklistInitialized()); |
- |
- // Delete the finch registry key to clear its values. |
- base::win::RegKey key(HKEY_CURRENT_USER, |
- blacklist::kRegistryFinchListPath, |
- KEY_QUERY_VALUE | KEY_SET_VALUE); |
- key.DeleteKey(L""); |
- |
- // Add the test dlls to the registry (with their name as both key and value). |
- base::win::RegKey finch_blacklist_registry_key( |
- HKEY_CURRENT_USER, |
- blacklist::kRegistryFinchListPath, |
- KEY_QUERY_VALUE | KEY_SET_VALUE); |
- for (size_t i = 0; i < arraysize(test_data); ++i) { |
- finch_blacklist_registry_key.WriteValue(test_data[i].dll_name, |
- test_data[i].dll_name); |
- } |
- |
- TestDll_AddDllsFromRegistryToBlacklist(); |
- CheckBlacklistedDllsNotLoaded(); |
-} |
- |
-void TestResetBeacon(scoped_ptr<base::win::RegKey>& key, |
- DWORD input_state, |
- DWORD expected_output_state) { |
- LONG result = key->WriteValue(blacklist::kBeaconState, input_state); |
- EXPECT_EQ(ERROR_SUCCESS, result); |
- |
- EXPECT_TRUE(blacklist::ResetBeacon()); |
- DWORD blacklist_state = blacklist::BLACKLIST_STATE_MAX; |
- result = key->ReadValueDW(blacklist::kBeaconState, &blacklist_state); |
- EXPECT_EQ(ERROR_SUCCESS, result); |
- EXPECT_EQ(expected_output_state, blacklist_state); |
-} |
- |
-TEST_F(BlacklistTest, ResetBeacon) { |
- // Ensure that ResetBeacon resets properly on successful runs and not on |
- // failed or disabled runs. |
- TestResetBeacon(blacklist_registry_key_, |
- blacklist::BLACKLIST_SETUP_RUNNING, |
- blacklist::BLACKLIST_ENABLED); |
- |
- TestResetBeacon(blacklist_registry_key_, |
- blacklist::BLACKLIST_SETUP_FAILED, |
- blacklist::BLACKLIST_SETUP_FAILED); |
- |
- TestResetBeacon(blacklist_registry_key_, |
- blacklist::BLACKLIST_DISABLED, |
- blacklist::BLACKLIST_DISABLED); |
-} |
- |
-TEST_F(BlacklistTest, SetupFailed) { |
- // Ensure that when the number of failed tries reaches the maximum allowed, |
- // the blacklist state is set to failed. |
- LONG result = blacklist_registry_key_->WriteValue( |
- blacklist::kBeaconState, blacklist::BLACKLIST_SETUP_RUNNING); |
- EXPECT_EQ(ERROR_SUCCESS, result); |
- |
- // Set the attempt count so that on the next failure the blacklist is |
- // disabled. |
- result = blacklist_registry_key_->WriteValue( |
- blacklist::kBeaconAttemptCount, blacklist::kBeaconMaxAttempts - 1); |
- EXPECT_EQ(ERROR_SUCCESS, result); |
- |
- EXPECT_FALSE(blacklist::LeaveSetupBeacon()); |
- |
- DWORD attempt_count = 0; |
- blacklist_registry_key_->ReadValueDW(blacklist::kBeaconAttemptCount, |
- &attempt_count); |
- EXPECT_EQ(attempt_count, blacklist::kBeaconMaxAttempts); |
- |
- DWORD blacklist_state = blacklist::BLACKLIST_STATE_MAX; |
- result = blacklist_registry_key_->ReadValueDW(blacklist::kBeaconState, |
- &blacklist_state); |
- EXPECT_EQ(ERROR_SUCCESS, result); |
- EXPECT_EQ(blacklist_state, blacklist::BLACKLIST_SETUP_FAILED); |
-} |
- |
-TEST_F(BlacklistTest, SetupSucceeded) { |
- // Starting with the enabled beacon should result in the setup running state |
- // and the attempt counter reset to zero. |
- LONG result = blacklist_registry_key_->WriteValue( |
- blacklist::kBeaconState, blacklist::BLACKLIST_ENABLED); |
- EXPECT_EQ(ERROR_SUCCESS, result); |
- result = blacklist_registry_key_->WriteValue(blacklist::kBeaconAttemptCount, |
- blacklist::kBeaconMaxAttempts); |
- EXPECT_EQ(ERROR_SUCCESS, result); |
- |
- EXPECT_TRUE(blacklist::LeaveSetupBeacon()); |
- |
- DWORD blacklist_state = blacklist::BLACKLIST_STATE_MAX; |
- blacklist_registry_key_->ReadValueDW(blacklist::kBeaconState, |
- &blacklist_state); |
- EXPECT_EQ(blacklist_state, blacklist::BLACKLIST_SETUP_RUNNING); |
- |
- DWORD attempt_count = blacklist::kBeaconMaxAttempts; |
- blacklist_registry_key_->ReadValueDW(blacklist::kBeaconAttemptCount, |
- &attempt_count); |
- EXPECT_EQ(static_cast<DWORD>(0), attempt_count); |
-} |
- |
-} // namespace |